3 3COM
®
X5 AND X506 UNIFIED SECURITY PLATFORMS
SPAM EMAIL FILTERING
Unsolicited spam now comprises over 80% of all email traffic.
Organizations continue to react with tactical fixes, but
deterioration in the quality of service for valid network traffic
remains. Email filtering in 3Com X5 and X506 platforms uses
the best-of-breed GlobalView
™
Mail Reputation Service, from
Commtouch
®
, to fight spam and email-borne malware at the
perimeter. The solution has been proven to reduce up to 80%
of incoming spam email at the network entry-point, while
providing the industry's lowest rate of false positives.
GlobalView offers a unique breadth of coverage, analysis and
delivery of information in real-time. It utilizes global detection
centers that analyze hundreds of millions of messages per
day, providing visibility into network traffic in every location,
globally. This critical mass of data is analyzed using patented
technology, enabling the delivery of real-time classification for
the source of each email received. In real time, the service
determines if a particular address is sending spam and/or
legitimate email, and if it has been compromised. These
capabilities enable the solution to react to distributed spam
attacks the moment they start.
IP MULTICAST WITH VPN
X5 and X506 devices enable organizations to deliver next-
generation services such as distance learning, real-time
training, and multimedia conferencing across the network
using IP multicast in conjunction with VPN—two technologies
which up until now have been mutually exclusive. Prioritized
traffic shaping within a VPN tunnel can provide cost savings
on long distance phone calls and leverages centralized
business applications.
FLEXIBLE SECURITY ZONE CONTAINMENT
The flexible architecture of the 3Com X5 and X506 Unified
Security Platforms allows the creation of multiple security
zones—wired/wireless and student/teacher LANs and DMZs,
for example—for greater IPS and firewall control of resources
and networks. Traffic between these security zones can then
be fully inspected and prioritized using stateful packet
inspection for access control and IPS for security control.
Security zone flexibility also extends to remote access users,
who can have their VPN connection terminated to a specific
zone, based on their identity, thanks to integration with
authentication directory services. This capability enables
flexible integration with network access control (NAC)
products.
STATEFUL PACKET INSPECTION FIREWALL
3Com X5 and X506 platforms are equipped with a fully ICSA-
c
ertified stateful packet inspection firewall which provides
access control and also recognizes prioritized packet flows
and helps maintain QoS. Granular firewall rules allow the
c
ontrol of traffic down to an individual IP address, and
fine-grain control of all security services.
T
his firewall function replaces router- or switch-based access
control lists that can lower performance in those devices.
SECURITY MANAGEMENT SYSTEM
In situations where there are multiple X5 and X506, as well as
TippingPoint, security devices, the optional 3Com TippingPoint
Security Management System (SMS) offers comprehensive
management capabilities.
Delivered as a rack-mount appliance, SMS enables
administrators to monitor, configure, diagnose and create
reports. With SMS, administrators can create IPS and firewall
profiles, implement VPNs, manage bandwidth, setup web
filters and perform other tasks from a central location. SMS
comes with factory-installed software for simple installation,
and is the only management system that provides high-
availability HA/failover capabilities.
QUARANTINE PROTECTION
Often the most dangerous security threats emanate from
within the corporate network. These threats may include
worms from traveling laptops and visitor/guest PCs, or
installation of unapproved applications such as peer-to-peer
file sharing that can carry spyware.
X5 and X506 devices configured with SMS can automatically
remove an infected device from the network, or “move” it to a
quarantine VLAN where it can be safely repaired before being
allowed back on the network. Quarantine protection isolates
infected devices from the network without the need for client
software, and transparently redirects web requests so users
know they are infected or running applications which do not
conform to corporate policies. Used in conjunction with
network access control, this enables a fully-rounded pre-
and post-access control solution.
KEY BENEFITS (
CONTINUED)